PROBABLYPWNED
VulnerabilitiesApril 11, 20265 min read

EngageSDK Flaw Exposed 30M Crypto Wallet Users on Android

Microsoft found an intent redirection vulnerability in EngageLab's Android SDK affecting 50M+ app installs. Crypto wallets with 30M users were at risk.

Marcus Chen

A vulnerability in EngageLab's Android SDK exposed more than 50 million users to potential data theft, including 30 million cryptocurrency wallet users whose credentials and financial data were at risk. Microsoft's security team disclosed the flaw after a coordinated disclosure process that took over a year from initial report to public advisory.

The issue demonstrates how third-party SDKs can introduce critical vulnerabilities that app developers have no visibility into—and how the Android ecosystem's supply chain complexity creates hidden attack surfaces.

What's the Vulnerability?

The flaw is an intent redirection vulnerability in EngageSDK version 4.5.4 and earlier. Android intents are messaging objects used to request actions between app components. When developers import EngageLab's library, an exported activity called MTCommonActivity is automatically added to the application's manifest during the build process.

This exported activity didn't properly validate incoming intents. A malicious app on the same device could craft intents that bypass Android's security sandbox and access private data belonging to any app using the vulnerable SDK. The attack doesn't require special permissions—just the ability to send intents, which any installed app can do.

In practical terms: if you installed a cryptocurrency wallet app using EngageSDK alongside a malicious app, the malicious app could potentially access your wallet credentials without triggering any security warnings.

Who Was Affected?

EngageLab's SDK provides push notifications and messaging functionality. It's widely used in cryptocurrency applications, likely because crypto projects often need real-time notifications for transactions, price alerts, and account security.

The exposure numbers are significant:

  • 50+ million total app installs across all affected applications
  • 30+ million cryptocurrency wallet installs specifically
  • Unknown number of individual users with compromised credentials

Microsoft hasn't named the specific wallet applications affected, but noted that "all of the detected apps using vulnerable versions have been removed from Google Play." The removal suggests Google's security team validated the risk and acted accordingly.

The Supply Chain Angle

This incident illustrates a broader problem in mobile app security. Developers integrate third-party SDKs for functionality they don't want to build themselves—push notifications, analytics, advertising, crash reporting. Each SDK becomes part of the app's attack surface.

Most developers don't audit SDK code. They trust that well-known libraries are secure. But as we've seen repeatedly with supply chain attacks across the software ecosystem, that trust isn't always warranted.

The EngageSDK vulnerability wasn't intentionally malicious—it was a design flaw that created unintended access paths. But from the perspective of users whose data could have been stolen, the distinction between malicious intent and negligent implementation doesn't matter much.

Timeline and Remediation

  • April 2025: Microsoft reports vulnerability to EngageLab
  • November 2025: EngageLab releases patched version 5.2.1
  • April 2026: Public disclosure

The 7-month gap between report and patch is concerning, though not unusual for coordinated disclosure involving third-party components. The additional 5-month wait before public disclosure likely reflects the time needed for affected apps to update.

Microsoft states there's no evidence the vulnerability was exploited in the wild. But absence of evidence isn't evidence of absence—particularly for vulnerabilities that would leave few forensic traces.

What Should Developers Do?

If your Android app uses EngageSDK:

  1. Update to version 5.2.1 or later immediately
  2. Check your manifest - Verify MTCommonActivity isn't exported unnecessarily
  3. Audit other SDKs - This likely isn't the only vulnerable component in your dependencies
  4. Implement intent validation - Even for SDK-provided components

For cryptocurrency app developers specifically, the stakes justify additional scrutiny. Users trust wallet applications with private keys and significant financial assets. A single vulnerability in a notification SDK can undermine security measures everywhere else in the application.

Broader Implications

The Android ecosystem's openness enables innovation but creates security challenges. Intent-based communication between apps is powerful and flexible—but that flexibility becomes dangerous when components don't properly validate incoming requests.

Google has made efforts to address these issues. Android 12 and later versions require explicit declaration of exported components and provide more granular permission controls. But older SDK versions compiled against earlier Android targets may not benefit from these protections.

The cryptocurrency angle adds urgency. We've covered how DeFi protocol hacks and credential theft campaigns target crypto users specifically. A vulnerability affecting 30 million wallet users would be extremely attractive to attackers focused on cryptocurrency theft.

Why This Matters

Third-party dependencies are unavoidable in modern app development. But each dependency is a trust decision that extends beyond the immediate functionality. When you integrate a push notification SDK, you're trusting that vendor with access to your app's execution context—and by extension, your users' data.

The EngageSDK incident ended relatively well: the vulnerability was found through security research rather than active exploitation, and patches were available before public disclosure. But the pattern should prompt organizations to:

  • Maintain inventories of third-party components
  • Monitor for security advisories affecting dependencies
  • Establish update processes that can respond quickly to vulnerability disclosures
  • Consider whether each dependency is truly necessary

SDK vendors occupy a critical position in the mobile supply chain. Their security practices cascade to every application using their code. EngageLab's vulnerability affected 50 million users—not because those users made poor security decisions, but because developers they trusted made reasonable decisions that had hidden risks.

Related Articles